Papers
Topics
Authors
Recent
2000 character limit reached

Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location

Published 29 Mar 2015 in cs.CR and stat.ML | (1503.08479v1)

Abstract: Active authentication is the problem of continuously verifying the identity of a person based on behavioral aspects of their interaction with a computing device. In this study, we collect and analyze behavioral biometrics data from 200subjects, each using their personal Android mobile device for a period of at least 30 days. This dataset is novel in the context of active authentication due to its size, duration, number of modalities, and absence of restrictions on tracked activity. The geographical colocation of the subjects in the study is representative of a large closed-world environment such as an organization where the unauthorized user of a device is likely to be an insider threat: coming from within the organization. We consider four biometric modalities: (1) text entered via soft keyboard, (2) applications used, (3) websites visited, and (4) physical location of the device as determined from GPS (when outdoors) or WiFi (when indoors). We implement and test a classifier for each modality and organize the classifiers as a parallel binary decision fusion architecture. We are able to characterize the performance of the system with respect to intruder detection time and to quantify the contribution of each modality to the overall performance.

Citations (173)

Summary

Active Authentication on Mobile Devices: A Multimodal Approach

The paper under consideration conducts an in-depth study into active authentication on mobile devices by leveraging multimodal behavioral biometrics. The authors present research based on a comprehensive dataset collected from 200 subjects using their personal Android devices over a period of at least 30 days. This dataset is noteworthy due to its size and the diversity of modalities it encompasses, providing a substantial foundation for studying insider threats in closed-world environments such as organizational settings.

The researchers emphasize the importance of continuous identity verification and propose a model integrating four primary biometric modalities: stylometry (text entered via a soft keyboard), app usage, web browsing patterns, and GPS-based physical location tracking. The classifiers developed for these modalities are organized into a parallel decision fusion architecture, aiming to optimize intrusion detection by balancing intruder detection time with minimal false acceptance and rejection rates.

Key Components of the Analysis

  1. Behavioral Modalities: The paper explores the distinct contributions of different behavioral data modalities:
    • Stylometry: Text characteristics are analyzed through n-gram analysis, effectively capturing personal typing idiosyncrasies. However, it requires significant text input to achieve low error rates.
    • Application Usage: The frequency and pattern of app usage serve as unique biometric signatures.
    • Web Browsing Behavior: Similarly, the distinct web domains visited contribute to the user's digital footprint.
    • Location: User location, ascertained through GPS or WiFi, consistently demonstrates a low margin of error for identity verification.
  2. Classifier Performance: The study succeeds in achieving an equal error rate (EER) of 5% after just one minute of device interaction, reducing to 1% after 30 minutes. Such statistical outcomes are pivotal as they illustrate the practical usability of this multimodal approach over short periods without compromising on security features.
  3. Fusion Architecture: The decision fusion strategy adopted does not require retraining of classifiers when incorporating additional modalities, allowing for improved scalability and flexibility. By employing the Chair-Varshney optimal fusion rule, the authors efficiently integrate input from multiple classifiers to yield a robust authentication decision.

Implications and Future Directions

The paper highlights significant advancements in the field of mobile security, specifically for insider threat detection, where unauthorized usage is likely to emanate from within an organization. This approach, which deftly combines behavioral analytics across multiple domains, allows for nuanced user authentication processes that adapt to dynamic environments characteristic of mobile device usage.

From a theoretical perspective, this study sets a precedent for integrating behavioral biometrics with decision fusion techniques, underscoring the need for scalable architectures in multimodal authentication systems. Practically, its implications in enhancing security protocols for mobile devices are substantial, potentially minimizing risks associated with unauthorized access to sensitive organizational data.

Moving forward, future research could pivot towards enhancing the granularity of the identified behavioral markers and exploring additional modalities that could be incorporated into this framework, such as touch dynamics and sensor data from device motion. Additionally, examining the response to adversarial attacks and improving resistance to spoofing remain vital to fortifying the robustness of such systems.

In conclusion, this paper's insights into active authentication pave the way for more sophisticated and secure user verification methods on mobile devices, with substantial potential for deployment across various domains requiring reliable security measures.

Whiteboard

Paper to Video (Beta)

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 1 tweet with 0 likes about this paper.